Resistance and Ignorance of Malware, a Problem Without End

Malware is a real problem that affects the whole computing world, which has adapted to different environments and has invaded the globalized world we know today. Malware is present on different technologies used throughout the computing evolution, no matter the type of the device used, connection or communication.

malware1

malware_keyboard

Due the accelerated computing evolution currently there is a need for people and organizations to remain always "connected", where information and resources must be available to be accessed and used at any time, from any location and any device. These multiple possibilities of communication in multivariate environments require the development of new technologies and new concepts in operating systems, applications and devices; software and hardware to adapt to new challenges and meet the needs of a growing world population that is always connected.

However after the great challenge to have all connected, new challenges arise to guarantee the safety of the users and resources in the network. Each time users connect to the network, they are exposed to a number of malware threats that can come at any time and through any way, as for example a text message, an email, a web link, a website, a download, the execution of an application, etc. All users connected to the network through services or devices have open doors to the world of computing, where connections can be established in many ways that the vast majority of users are unaware.

A high percentage of users do not have the required knowledge to address these threats and implement preventive measures to avoid being victimized or being infected with some kind of malware. Usually only after a negative event occurs we realize that we were violated, before it happened we thought "we were safe", that we were immune and our entire activity in the network would have no problem; we thought that nothing bad would happen to us, because this usually only happens to "other people", not to me. Being connected is like a lottery in which every day there is a good chance of "winning", of being affected by malware within this chance the increase or decrease of this percentage depends largely on our awareness of the existing risks, the awareness of using good practices, to take preventive measures, to consult and learn regarding the subject, to know the recommended steps to follow in case of the presence of a negative event of malware infection when we are connected or disconnected.

Every new technology has its strengths and weaknesses that requires adaptation time, a testing and feedback time within which many vulnerabilities can be exploited. Therefore in the implementation of each new technology or merging with previous technologies, there is a risk of affecting what was already built and what we considered "safe". As we rely on what we know, we experience and what we can predict; however the computing world is still an uncertain field which may arise unknown elements until now and change everything we thought was functional and safe.

Information is one of the most important assets in the companies, it is invaluable the whole operation of the company is based on information: business, customers, supliers, strategies, allies, oportunities, etc. Information must be protected in the best possible way against all the existing threats. However malware continues to evolve and looking for different methods of improvement, to be increasingly stronger and immune to the defense mechanisms implemented to be fought. Every day is a struggle between those who are trying to penetrate and break the barriers of security and those who seek to develop new technologies to strengthen existing security mechanisms and prevent these threats to be succeed.

First of all we have to accept and realize that the malware is a real problem that is present everywhere and we will always be vulnerable in some fashion. After that it is important to create a security culture where all the relevant security information should be available for all users connected to the network about good practices, recommendations, policies, threats, precautions, network environments, devices usage, etc. This approach should be implemented in the companies and corporations, a security culture for everyone can get the necessary knowledge to take the measures and precautions to prevent the constant threat of malware and reduce the percentage risk of being victims of it. This work must be leaded for the information security team including managers, department heads and strategic integrants of the company. This work must be leaded for the information security team including managers, department heads and strategic integrants of the company. The information security professional should be aware of the strategies needed to prevent the walware threat; developing a security infrastructure, creating security policies, work teams, good practices, news, reports, keep people informed and to follow up all these processes in all enterprise levels.

There are lots of scenario find in real time which can prove Database Administrator as Superhero in some circumstances. Does it true or not? What is the actual meaning of Oracle DBA who develops some extra strength and power for solving database errors without any help from outside?

Damaging your equipment has become a very common affair these days. Gone are the days when people purchased things like mobile phones and laptops and used them for years together without raising any issue